Cloud Services. Anti-Spam. Admin Guide

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Cloud Services. Email Anti-Spam. Admin Guide"

Transcription

1 Cloud Services Anti-Spam Admin Guide 10/23/2014

2 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings... 6 Defining Settings to Apply Globally, for a Domain, or for a Group... 6 Applying Global Settings... 7 Applying Settings for a Specific Domain... 7 Applying Settings for a Group... 8 Detection Settings and Actions... 9 About Anti- Spam Detection Settings and Actions... 9 Enabling the Use of Approved Senders Lists Enabling the Use of Blocked Senders Lists Enabling Spoofed Sender Protection with Sender Policy Framework (SPF) Using Public Block Lists Using the Spam Matching (Signature) System Enabling Predictive (Heuristic) Spam Detection Blocking Newsletters Allowing Newsletters Defining a Bulk Mail Address Defining a Subject Line Tag Frequently Asked Questions about Blocking Newsletters Quarantine About Quarantine Settings Configuring Notifications User Notification Controls Notification Content Enabling Users to Request Approved Senders Troubleshooting Active Summary Notifications Notifying Users When an Alias is Changed Defining Quarantine Administrators Defining Spam Manager Password Controls

3 About Spam Manager Password Policies Configuring a Spam Manager Password Policy Making Your Acceptable Use Policy (AUP) Available Defining the Summary Notifications Display Activating Spam Manager Groups Defining Groups for Anti- Spam Viewing Anti- Spam Groups Creating an Anti- Spam Group Deleting an Anti- Spam Group Editing an Anti- Spam Group Manually Downloading an Anti- Spam Group Member List Uploading a Group Member List for Anti- Spam Uploading a Global or Group List to the Portal for Anti- Spam Exclusions About Defining Exclusions Creating an Exclusions List Downloading an Exclusion List Uploading an Exclusion List Approved and Blocked Senders Introduction to Approved Senders Lists and Blocked Senders Lists About Group and User Lists Defining Global and Group Lists Downloading an Approved or Blocked Senders List (global and group level) Viewing Approved and Blocked Senders Lists at the Global and Group Levels Viewing a User Approved or Blocked Senders List Adding an Entry Directly to the Approved or Blocked Senders List Downloading a User Approved Senders List or a Blocked Senders List Uploading a User Approved or Blocked Senders List to the Portal About Defining User Lists in the Portal Managing Group Lists and User Lists Applying Group List Control Giving Users Control of Their Lists

4 Managing List Priorities Spam Analysis Tool About the Spam Analysis Tool Exporting an from Microsoft Outlook Spam Manager Deployment About Deploying Spam Manager About Configuring Spam Manager Preparing to Deploy Spam Manager Configuring Anti- Spam Listing Domains Deciding the Spam Manager Deployment Policy Identifying Quarantine Administrators Identifying Account Groups Identifying Aliases Providing Web Access Communications to Your Organization about Spam Manager Advance Announcement Pre- activation Reminder Pre- activation Alias Owner - Announcement Change to Active Summary Notifications - Announcement Deploying Spam Manager Spam Manager Accounts and Aliases Pre- activation Announcement New Account Groups Managing Passwords Spam Manager Deployment Checklist

5 INTRODUCTION TO ANTI-SPAM ABOUT ANTI-SPAM The following Anti- Spam detection methods can be used to scan your incoming s: Skeptic TM heuristic engine Signaturing system Dynamic IP block list Exclusions Blocked senders list Approved senders list Sender Policy Framework An artificial intelligence engine that creates an ever- expanding knowledgebase for spam identification. Anti- Spam distinguishes newsletters from spam. You can choose to detect newsletters as well as spam. Various signature- building engines that create a vast knowledge base of signatures of spam messages currently in circulation. A recognized public block list of IP addresses of globally known sources of spam. A list of addresses to be excluded from the protection of Anti- Spam. A list of blocked senders that you can specify at global, group, and user level (depending on your organization's configuration). The list can contain addresses, domains, or IP addresses that you recognize as sources of spam or other unwanted . A list of approved senders that you can specify at global, group, and user level (depending on your organization's configuration). The list can contain addresses, domains, or IP addresses. The list enables from a sender on list to pass through the spam service without interruption. Sender Policy Framework (SPF) reduces spam by detecting sender spoofing and leading to reduced phishing attempts where domain spoofing is commonplace. You can select the detection methods that you require for your incoming . For each method apart from SPF, you can associate different actions against the suspected . You can also define any addresses that are not subject to the scanning process (exclusions). As an Administrator, you can configure the detection settings in the portal according to your organization's requirements. Detection settings can be defined at: Global level for all of the domains. Domain level for individual domains. Group level for specific groups. NOTE: SPF cannot be configured for specific groups. 4

6 Specific users can have their own settings and manage their personal approved and blocked lists of senders in their Spam Manager accounts. User settings override group and global settings; in turn, group settings override global settings. Administrators may want to use global or group detection settings and enable users to manage their own user approved and blocked senders lists. NOTE: Group Settings and User Settings are not available by default. Contact the Customer Support team to be provisioned with this facility. Settings that administrators need to define when they configure the Anti- Spam service are: Detection settings o Define the spam detection methods to use Define the actions to be taken on detection of spam If spam redirection is selected as an action, set the address to which spam is routed If tagging the subject line is selected as an action, define the tag text for s that are tagged as spam Spam Quarantine settings Depending on your organization s configuration, you may not see Spam Quarantine settings. Groups to which you want to apply specific settings. Exclusions (addresses to be excluded from scanning). Approved senders and blocked senders lists. Warning: Anti- Spam is not automatically enabled when the service is provisioned. You must activate the different spam detection methods to enable the service. LOCATING THE ANTI-SPAM PAGES IN THE PORTAL Depending on your organization s configuration, you may not see all of the portal pages described. To locate the Anti-Spam pages in the portal: Click Services > Services > Anti- Spam. If Global Settings is selected in the drop- down list, up to four tabs display: Detection Settings, Quarantine Settings, Approved Senders, and Blocked Senders. If a specific domain is selected from the Domains drop- down list, up to five tabs are displayed, depending on your organization s configuration: Groups, Detection Settings, Quarantine Settings, Exclusions, and List Management. If a group is selected from the Groups drop- down list, up to four tabs are displayed: Group Members, Detection Settings, Approved Senders, and Blocked Senders. All of the Anti- Spam settings are defined in these tabs. 5

7 ANTI-SPAM BEST PRACTICE SETTINGS When you are provisioned with the Anti- Spam service, the service is enabled with default settings. We recommend that you evaluate the tagged spam that you receive using these settings, and how these settings work for your organization s mail flow. When you are confident that the service is only detecting spam , change to the best practice settings. To change to the best-practice settings: 2. Select Global Settings or a specific domain from the Domains drop- down list. 3. In the Detection Settings tab, we recommend modifying the relevant settings as follows: Blocked senders list (IP addresses only) Blocked senders list (domains and addresses only) Dynamic IP block list Signaturing system Skeptic TM heuristics Set to Block and delete the mail. Set to Block and delete the mail. Set to Block and delete the mail. Set to Block and delete the mail. Set to Tag the subject line but allow mail through. Once you are happy that only spam is being detected with this setting, change it to Block and delete. DEFINING SETTINGS TO APPLY GLOBALLY, FOR A DOMAIN, OR FOR A GROUP You can configure and apply default Anti- Spam settings to all domains, or you can apply custom settings to an individual domain by using the Domains drop- down list. Most often you will configure the Anti Spam service using your global settings and making fewer changes on a domain- level basis. If you have defined any groups, you can also apply specific settings for each group. To define whether settings apply globally, for a domain, or for a group: 1. Click Services > Services > Anti- Spam. 2. Select the domain or group to work with from the drop- down list at top left. 3. Specify the required settings; they are applied at the level that you selected in the previous step. When you select a domain or group to work with, the settings from the next highest level are inherited. You can then make your required amendments to apply for the domain or group. Different tabs are available at the various levels, reflecting the settings that are available at each level. 6

8 APPLYING GLOBAL SETTINGS You can configure and apply default Anti- Spam settings to all domains. Use the Domains drop- down list. Most often you will configure Anti- Spam using your global settings and making fewer changes on a domain- level basis. To apply global settings: 2. Ensure that Global Settings is selected in the Domains drop- down list: Up to four tabs are displayed (Detection Settings, Quarantine Settings, Approved Senders, and Blocked Senders) depending on your organization s configuration. Any settings at this level apply globally across all of your domains. APPLYING SETTINGS FOR A SPECIFIC DOMAIN For each domain name that is registered for Anti- Spam you can override Global Settings and apply different rules and settings to it. You can configure Groups, Detection Settings, Quarantine Settings, Exclusions, and List Management settings. To apply settings for a specific domain: 2. Select the domain from the Domains drop- down list. To reduce the number of domains in the list, you can enter the first three or more characters of the domain name. Only those that contain those starting characters are listed. Up to five tabs display (Groups, Detection Settings, Quarantine Settings, Exclusions, and List Management) depending on your organization s configuration. 3. In the Detection Settings and Quarantine Settings pages, ensure that the Use custom settings option is selected. If it is not selected, all fields in these pages remain inactive and unable to be edited. The fields in these pages inherit the global settings until you make any changes. When you select Save & Exit on this screen, the changes you make are applied only to the selected domain. The Groups, Exclusions, and List Management pages are active and editable. Changes to approved senders and blocked senders lists can only be made at global or group level. When you select a specific domain to work with, the name of the domain is displayed as a heading. 7

9 APPLYING SETTINGS FOR A GROUP If you have defined a group, you may want to configure the Detection Settings, Approved Senders, and Blocked Senders for the group. In this manner you can create different groups that use different levels of detection and that respond to detection in different ways. To apply settings for a group: 2. Select the domain that the group is in, from the Domains drop- down list. 3. Select the group from the Groups drop- down list. Four tabs display: Group Members, Detection Settings, Approved Senders, and Blocked Senders. The name of the domain and group displays in the page heading. The Detection Settings page presents a further option to Use custom settings. Unless this is selected, all fields in this page are inactive and cannot be edited. If this option is selected, all fields become active and inherit the domain settings until you make any changes. The available settings are the same as those at global and domain level. NOTE: The changes you make here are applied only to the selected group (provided the changes are saved). 8

10 DETECTION SETTINGS AND ACTIONS ABOUT ANTI-SPAM DETECTION SETTINGS AND ACTIONS Define the detection methods to use for the Anti- Spam service. You can associate a specific action for the spam s that are detected by each detection method. Apply the detection settings at global level, domain level, or group level. In this way, you can use specific detection methods and actions for a specific domain or group. The available detection settings are described here. Detection method Approved senders list Spoofed Sender Protection Description You can define a list of IP addresses, domains, or addresses that are approved senders. s that are received from these senders are not identified as spam. You can also use the approved senders list to ensure that wanted newsletters go through the Anti- Spam service without interruption. SPF (Sender Policy Framework) reduces spam by detecting sender spoofing and so leading to reduced phishing attempts where domain spoofing is commonplace. Some organizations publish an SPF record in their DNS. The SPF record authorizes sending hosts for their domains. The recipient verifies the sender against the authorized hosts. If verification fails, the sender is spoofing and the should not be trusted. When you use SPF spam detection for a domain, inbound to your domain is verified against the SPF policy of the reported sender. If the reported sender publishes a hard- fail SPF policy and the inbound fails SPF verification, the is blocked and deleted. The block and delete action re- enforces the sender hard fail policy which says do not accept s that are not from my authorized host names. A 5xx error is returned to the sender. Custom blocked senders list Dynamic IP block list Signaturing system Skeptic TM heuristic engine Other types of SPF policy, for example soft- fail, are ignored. You can enable spoofed sender detection for all of your domains or for individual domains. You cannot enable it for individual groups or users. You can define a list of IP addresses, domains, or addresses that you recognize as sources of spam or other unwanted . The Anti- Spam service can detect from globally known sources of spam. Companies and individuals in the dynamic public block list have demonstrated patterns of junk ing. The block list is a recognized public block list of IP addresses. A signature is a unique string that defines a specific spam . This string is used to detect further instances of the . The signaturing system uses proprietary and commercially- available signature- building engines to create a vast knowledgebase of spam message samples that are currently in circulation. The signaturing system enables exact matching of spam, and reduces the chances that the scanner stops genuine business s. In addition, the signaturing system speeds the spam identification process and the message handling process. Skeptic uses artificial intelligence to create an ever- expanding Knowledge base to identify spam. The heuristics method scores each against a set of rules. If an achieves more than a specified score, it is immediately identified as spam. Newsletters can be a burden for organizations. The Anti- Spam service distinguishes spam from newsletters. To block unwanted newsletters, you must have the Skeptic heuristic detection setting enabled. 9

11 For each spam detection method, define an action for the spam s that are detected. The available actions are described below. Action Append a header but allow the through Description The Append a header actions add a string to the header. The format for the string is: X-Spam-Flag:YES This string identifies the as spam and enables further action when it enters your system or your users' client. For example, you can divert the into a folder that you have set up to receive spam. Append a header and redirect the to a bulk mail address Block and delete the Tag the subject line but allow the through Quarantine the The detected is delivered to the recipient's inbox. The string is added to the header as described above. The detected does not reach the intended recipient. The is redirected to the address that you specify for bulk . The detected is not sent to the intended recipient's inbox. The is deleted. The Tag the subject line action adds some text that you define to the 's subject line. The detected is delivered to the recipient's inbox. NOTE: When you first configure Anti- Spam, it is useful to specify a bulk address to see that spam is trapped as expected. The detected is not delivered to the recipient's inbox. The is quarantined. Depending on your Spam Manager settings, the recipient may be notified that they have received spam. They may have the option to view it and release it to their inbox. If your organization s Anti- Spam service configuration does not include Spam Quarantine, the quarantine option is not available. The risk that Anti- Spam may stop genuine business s (false- positives) is minimal. See the section in your contract that states the false- positive rates for spam. We recommend that you select the Block and delete action with the signaturing and the public block elements methods. If you do not select the Block and delete, your mailbox collects a large amount of spam in a short time. ENABLING THE USE OF APPROVED SENDERS LISTS If you use global, group, or user lists, or a combination of these, you must enable the use of approved senders lists as a detection method. To enable the use of approved senders lists: 2. Click the Detection Settings tab. 3. In the Approved Senders area, select the appropriate checkbox to enable the approved senders list. The selection depends on the type of listed senders that are allowed to bypass the scan: only IP addresses, only domain names and addresses, or all types of sender (select both boxes). 4. Click Save and Exit. A confirmation of the setting displays. 10

12 ENABLING THE USE OF BLOCKED SENDERS LISTS Whether you use global, group, or user lists, or a combination of these, you must enable the use of blocked senders lists. When you enable use of blocked senders lists, you must define an action for any that is identified as originating from a blocked sender. NOTE: Group Settings and User Settings are not available by default. Contact Customer Support to be provisioned with this facility. To enable the use of blocked senders lists: 2. Click the Detection Settings tab. 3. Under Responsive Spam Detection, select the appropriate checkbox to enable the blocked senders list depending on which type of senders in your lists are allowed to bypass the scan: only IP addresses, only domain names and addresses, or all types of sender (select both boxes). 4. For each Use blocked senders list checkbox that you have selected, select an action for the detected spam from the Action drop- down list. 5. Click Save and Exit. A confirmation message displays. 11

13 ENABLING SPOOFED SENDER PROTECTION WITH SENDER POLICY FRAMEWORK (SPF) SPF reduces spam by detecting sender spoofing and leading to reduced phishing attempts where domain spoofing is commonplace. Some organizations publish an SPF record in their DNS. The SPF record authorizes sending hosts for their domains. The recipient verifies the sender against the authorized hosts. If verification fails, the sender is spoofing and the should not be trusted. When you use SPF spam detection for a domain, inbound to your domain is verified against the SPF policy of the reported sender. If the reported sender publishes a hard- fail SPF policy and the inbound fails SPF verification, the is blocked and deleted. The block and delete action re- enforces the sender hard fail policy which says do not accept s that are not from my authorized host names. A 5xx error is returned to the sender. Other types of SPF policy, for example soft- fail, are ignored. You can enable SPF for all of your domains or for individual domains. You cannot enable it for individual groups or users. To enable the spoofed sender detection: 1. Click Services > Services > Anti- Spam > Detection Settings. 2. Select Global Settings or select a domain from the drop- down list. 3. In the Spoofed Sender Detection section, check the Use SPF check box. 4. Click Save and Exit. Confirmation of the setting displays. USING PUBLIC BLOCK LISTS A public block list is a list of information about known spammers. The Anti- Spam service uses a dynamic IP block list as part of its protection. To enable the use of a public block list: 2. Click the Detection Settings tab. 3. In the Responsive Spam Detection area, check the Dynamic IP public block list box. 4. Specify an Action from the drop- down list, to be used for any s sent by senders on the public block list. 5. Click Save and Exit. A confirmation of the settings displays. 12

14 USING THE SPAM MATCHING (SIGNATURE) SYSTEM The signaturing system uses proprietary and commercially available signature- building engines to create a vast knowledgebase of known spam messages currently in circulation. A signature is a unique string of bits that define a specific spam , which can then be used to detect further instances of the . This enables exact matching of spam, significantly reducing chances of false- positives as well as speeding identification and message- handling. To enable the use of the signaturing system: 2. Click the Detection Settings tab. 3. In the Responsive Spam Detection area, select the Use signaturing system checkbox. 4. Select an Action from the drop- down list, to be used for any s that the signaturing system finds. 5. Click Save and Exit. A confirmation of the setting displays. ENABLING PREDICTIVE (HEURISTIC) SPAM DETECTION The Skeptic heuristics detection method differs from the signaturing system it uses predictive technology instead of reactive technology. The predictive nature of Skeptic targets unknown spam threats and suspicious s. Skeptic scores each against a set of rules. If an achieves more than a specified score, it is identified as spam. The Skeptic heuristics detection method helps to identify those spam s that change most frequently, such as unsuitable or fraudulent mailings. Many organizations block and delete the suspicious s that are detected through Skeptic. However, due to the predictive nature of this method, you may want to quarantine such s. The Skeptic heuristics detection method also enables you to block newsletters. To enable the use of Skeptic: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. In the Predictive Spam Detection area, select the Use Skeptic heuristics checkbox. 3. To block newsletters, check the Use newsletter detection checkbox. 4. Select an Action from the drop- down list, to be used for any s that Skeptic finds. 5. Click Save and Exit. Confirmation of the setting displays. 13

15 BLOCKING NEWSLETTERS You can block newsletters globally, for a domain, or for a group. To block newsletters globally: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Ensure that Global Settings is selected in the drop- down list at the top of the page. 3. In the Predictive Spam Detection area, ensure that the Use Skeptic heuristics checkbox is checked. 4. To block newsletters, check the Use newsletter detection checkbox. 5. Select an Action from the drop- down list, to be used for any s that Skeptic finds. 6. Click Save and Exit. Confirmation of the setting displays. To block newsletters for a domain: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Select the required domain from the drop- down list at the top of the page. 3. In the Predictive Spam Detection area, ensure that the Use Skeptic heuristics checkbox is checked. 4. To block newsletters for the selected domain, check the Use newsletter detection checkbox. 5. Select an Action from the drop- down list, to be used for any s that Skeptic finds. 6. Click Save and Exit. Confirmation of the setting displays. To block newsletters for a group: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Select the domain to which the group belongs from the drop- down list at the top of the page. 3. Select the required group from the Groups drop- down list. 4. In the Predictive Spam Detection area, ensure that the Use Skeptic heuristics checkbox is checked. 5. To block newsletters for the selected domain, check the Use newsletter detection checkbox. 6. Select an Action from the drop- down list, to be used for any s that Skeptic finds. 7. Click Save and Exit. Confirmation of the setting displays. 14

16 ALLOWING NEWSLETTERS You can allow newsletters globally, for a domain, or for a group. To allow newsletters globally: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Ensure that Global Settings is selected in the drop- down list at the top of the page. 3. In the Predictive Spam Detection area, uncheck the Use newsletter detection checkbox. 4. Click Save and Exit. Confirmation of the setting displays. To allow newsletters for a domain: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Select the required domain from the drop- down list at the top of the page. 3. In the Predictive Spam Detection area, uncheck the Use newsletter detection checkbox. 4. Click Save and Exit. Confirmation of the setting displays. To allow newsletters for a group: 1. Select the Services > Services > Anti- Spam > Detection Settings tab. 2. Select the domain to which the group belongs from the drop- down list at the top of the page. 3. Select the required group from the Groups drop- down list. 4. In the Predictive Spam Detection area, uncheck the Use newsletter detection checkbox. 5. Click Save and Exit. Confirmation of the setting displays. DEFINING A BULK MAIL ADDRESS If a spam detection method includes the action to Append a header and redirect to a bulk mail address, you must define the address to which the spam mail is redirected. To define a bulk address: 2. Click the Detection Settings tab. 3. In the Bulk Mail Address area, enter the address to which to redirect the spam mail. This field is inactive unless one of the spam detection actions is Append a header and redirect to a bulk mail address. 4. Click Save and Exit. Confirmation of the setting displays. 15

17 DEFINING A SUBJECT LINE TAG You can define the text that is used in the subject line of a suspected spam when the action Tag the subject line but allow mail through is selected. The default tag is SPAM: as a prefix to the subject line. You can define whether to put the tag before or after the subject line text. To define a subject line tag: 2. Click the Detection Settings tab. 3. In the Subject Line Text area, enter the text to appear on the subject line of s tagged as spam. This field is inactive unless the Predictive Spam Detection action is Tag the subject line but allow mail through. 4. Select where to place the inserted text by selecting one option from: Put this text in front of the subject line Put this text at the end of the subject line 5. Click Save and Exit. A confirmation of the setting displays. FREQUENTLY ASKED QUESTIONS ABOUT BLOCKING NEWSLETTERS Question What is the difference between spam and newsletters? Why do I receive newsletters that I did not request? How can I stop receiving s from a third party? How can Anti- Spam help me block newsletters? How do I block newsletters? Can I still receive selected newsletters if I block newsletters? Answer Spam is defined as any unsolicited commercial from unknown sources. The sender obtains the address without the recipient's approval. Examples include phishing s, advance- fee fraud scams (419s), and s touting pharmaceuticals. Newsletters are commercial s. To receive a newsletter you need to subscribe to a mailing list. You may opt in unwittingly as part of a software installation, download registration, or membership registration. Examples of web sites that opt users into newsletters include Facebook, LinkedIn, and updates from company web sites. You may have opted into an newsletter without realizing it. A company may pass your details to third parties unless you actively select an option to stop it doing so. If you do not opt out, you indirectly authorize the sender. Click the unsubscribe link that is provided in the newsletter. Unsubscribing can be time consuming especially if you have signed up to multiple third- party newsletters. Be aware that some spam messages may use an unsubscribe link to harvest your address when you click on it. Anti- Spam can differentiate between spam and newsletters. You may want to eradicate all newsletters from your inbox. To help you block all newsletters, there is an option to block newsletters at global, domain or group level. You configure newsletter detection in the portal. Go to Services > Services > Anti- Spam > Detection Settings. Activate the service at global level, domain level, or group level. Yes. You can add the sender of required newsletters to your approved senders list. 16

18 QUARANTINE ABOUT QUARANTINE SETTINGS NOTE: Depending on your organization s configuration of the Anti- Spam service, you may not have access to the quarantine service. Therefore, the Quarantine Settings pages are not visible in the portal. For further details, contact Customer Support. The spam mail that the Anti- Spam service detects is held in Spam Manager. From there the mail can be viewed, released to the original recipient s inbox, or deleted. Individual users or other nominated individuals can handle the messages in Spam Manager, depending on the deployment policy chosen. Similarly, the contents of Spam Manager may be reviewed regularly or checked only occasionally for specific messages. The quarantine settings you can define within the portal include: Specifying notifications Defining a default language for Spam Manager notifications Defining Quarantine Administrators Enabling ClientNet users to request additions to the global approved senders list Aliases Specify whether, when an account is created, a welcome message is generated and summary notifications are enabled. Notifications provide information to your users and ask them to register with and log on to Spam Manager. You can also specify whether the users should receive active summary notifications. Such notifications contain Release links to release the directly from the notification. Specify the default language for the content of welcome messages and notifications. Quarantine Administrators are users of Spam Manager who have extended privileges to perform administrative functions in Spam Manager. Specify whether your users can request that senders of suspect s can be added to the organization s global approved senders list. Specify whether your Spam Manager users are informed when the Quarantine Administrator in Spam Manager creates aliases. For example, if a user has multiple addresses, each with their own Spam Manager account, they can be aliased to a single account. The spam that is sent to any of their addresses is managed using a single Spam Manager account. Quarantine settings can be defined to apply at global and domain level. 17

19 CONFIGURING NOTIFICATIONS When you create an account, you can specify whether a welcome message is generated and whether summary notifications are enabled. Welcome messages ask users to register with and log on to Spam Manager. Summary notifications contain a list of received spam s. They may provide a link for the user to log on to Spam Manager to view them. Active summary notifications contain Release links, for users to release an directly from the notification without repeatedly logging on to Spam Manager. If welcome messages and notifications are not sent, deployment is silent; that is, a designated Quarantine Administrator accesses the user s Spam Manager account on the user s behalf. To configure Spam Manager notifications: 2. Click the Quarantine Settings tab. 3. In the Notifications area, check Users receive welcome messages and summary notifications to enable this feature. Typically, this setting to send welcome messages and summary notifications is applied to all new accounts that are created in Spam Manager. This notification setting can be overridden when a Quarantine Administrator creates an account. Also, where notifications are enabled for a Spam Manager user s account, that user may also be able to switch notifications off themselves. 4. If you have selected to send notifications, specify the frequency with which summary notifications are sent, by selecting an option from the drop- down list. This setting only affects the default configuration for new accounts. If this setting is changed after the activation of Spam Manager, it does not affect existing accounts. 5. Specify the default language for the welcome messages and notifications that are triggered by Spam Manager. If a user selects a different language for the Spam Manager display, the default setting for notifications is overridden. Spam Manager is not associated with a specific domain or client. Spam Manager can detect the appropriate language for the logon screen using the Web browser s localization settings. 6. Click Save and Exit. A confirmation message displays. NOTE: You can permit new users to override these notification settings if required. 18

20 USER NOTIFICATION CONTROLS The Users can override notification defaults setting determines whether users can override the default notification setting. If the setting is enabled, users are given notification options in their Spam Manager accounts. Note: This setting only affects the default configuration for new accounts and does not affect existing accounts. To permit users to override default notification settings: 2. Select Quarantine Settings. 3. Check the Users can override notification defaults checkbox to permit users to amend their notification settings, if required. NOTIFICATION CONTENT The notification content setting enables users to receive active summary notifications. Active summary notifications enable users to release blocked s directly into their inbox from the notifications without continually logging on to Spam Manager. When active summary notifications are enabled, the notification that is sent contains the same information as the regular Spam Manager notification: subject line and date. A Release link appears next to each spam . If a user receives active summary notifications, you can disable access to their Spam Manager accounts. An account is still created for them, which a Quarantine Administrator can manage, but the user need have no visibility of it. If access to Spam Manager accounts is disabled, those users notifications do not contain a link to log on to Spam Manager. The Release link in active summary notifications is only displayed in notifications where clients allow HTML. This is especially pertinent on mobile devices. If this setting is enabled for users without HTML , their notifications do not contain the Release link. In this case, it is advisable to let users access their Spam Manager accounts or designate a Quarantine Administrator to manage their spam . For security reasons, a user can only release an once from an active summary notification. It prevents a malicious user from releasing an multiple times; thereby performing a denial of service (DoS) attack. The can be released multiple times from Spam Manager. Or the Quarantine Administrator can release it on behalf of the user. Active summary notifications can be set for the whole organization or per domain. By default, active summary notifications are disabled. Ensure that the Notifications setting enables users to receive active summary notifications. 19

21 To enable active summary notifications: 2. Select the Quarantine Settings tab. 3. In the Notification content section, ensure the box Users can release s directly from notifications is checked. 4. Define whether or not users can access Spam Manager using the Disable access to Spam Manager for users checkbox. 5. Click Save and Exit. A confirmation message displays. ENABLING USERS TO REQUEST APPROVED SENDERS You can enable Spam Manager users to request that the sender of an that is identified as spam is added to the organization s global approved senders list. Then, the user has the option to request an approved sender when they release the from Spam Manager. NOTE: If your users control their own approved and blocked senders lists at user level in Spam Manager, the Approved Senders Request Facility does not need to be enabled. To enable users to request approved senders: 2. Select Quarantine Settings. 3. To enable users to request additions to the approved senders list, in the Approved sender request facility section. 4. Enter the address to which approved senders list requests are sent. This address should be the address of the person who is responsible for managing the approved senders lists in the portal. 5. Click Save & Exit. The address is validated to check that it is a valid address format and has a domain that belongs to you. TROUBLESHOOTING ACTIVE SUMMARY NOTIFICATIONS Issue A user has tried to release an , but is directed to the Spam Manager logon page A user receives standard spam notification s instead of active ones Some entries in a user s active summary notification do not have a release link Answer The user s Spam Manager account may have been deleted. The user can still have an active summary notification in their inbox. If a release link is clicked, Spam Manager detects that there is no such account and redirects them to the logon page. If a new user has never logged into Spam Manager and set up a password, they receive the standard notification. Once they log on for the first time, the user will receive active summary notifications in future. If you enable active summary notifications in the portal before a scheduled notification is sent out, some s do not have the release link. This is because the s were flagged as spam before the feature was enabled and the release link was not assigned to them. All subsequent s within the active summary notifications contain the release link. 20

22 Issue A Spam Manager Quarantine Administrator clicks the release link for another user s account and a message says that the has been deleted A user s cannot be released Answer If the has not been deleted from Spam Manager, it is likely that the Administrator revoked access for that user s account since the active summary notification was sent out. The has already been deleted. The quarantine period has expired. The user s access permissions have been revoked. Active summary notifications have been disabled since the notification was sent, or some other change to the Spam Manager configuration has been made that causes the release not to be possible. NOTIFYING USERS WHEN AN ALIAS IS CHANGED Aliases are used to: Direct all spam that is sent to a user with multiple addresses to a single Spam Manager account. Manage spam sent to a distribution list address, using a single Spam Manager account. By their nature, aliases operate in the background and users check any spam using Spam Manager as required. If Administrators make any changes to aliases, it may be useful for the users who are affected to be made aware of those changes. To notify users when a change is made to an alias: 2. Select Quarantine Settings. 3. In the Aliases section, check the box Users are always informed when administrators change settings which affect their aliases. 4. Click Save and Exit. DEFINING QUARANTINE ADMINISTRATORS Quarantine Administrators are users of Spam Manager who have extended privileges. These privileges allow them to perform some administrative functions in Spam Manager, including: Viewing details of Spam Manager accounts Creating accounts Deleting accounts Creating aliases and account groups to direct the spam of a distribution list or group of users to a single account Logging on to another user's Spam Manager account and managing their spam. You can enter up to 65 Quarantine Administrator addresses. 21

23 To define Quarantine Administrators: 2. Select Quarantine Settings. 3. Enter the addresses of the Quarantine Administrators. Multiple addresses must be separated with a semi- colon. NOTE: The Spam Manager Quarantine Administrator Guide describes the Quarantine Administrator role and tasks. DEFINING SPAM MANAGER PASSWORD CONTROLS This procedure describes how to ensure that all newly created users must change their passwords when they first use the service. It also explains how to force an individual user to change their password. To define Spam Manager password controls: 2. Select Quarantine Settings. 3. In the Password Controls section, under Password policy, the current policy in use is displayed. This is Basic, Standard, Enhanced, or Custom. Custom displays if any changes have been made to the default settings inserted by any of the templates. 4. Check Initial password change. Any new users that are created after you check this box must change their password when they first log on to Spam Manager. This new password must comply with the password policy that you have put in place. When you enable this option, the password change is not enforced for any accounts already in existence, even if they have not yet logged on to Spam Manager. 5. To force an individual user to change their password, enter their address in the box, and select the Single account password change option. You must select Save & Exit to force the user to change their password. 6. To force all users to change their passwords when they next log on, select All accounts password change. 7. Select Save & Exit. 22

24 ABOUT SPAM MANAGER PASSWORD POLICIES Password controls are used to enable and enforce your password policy for Spam Manager. You can select from three default templates to form the basis for a password policy. These policies are intended as a starting guideline only. We recommend that you customize these settings to your organization s requirements and to fit in with your Acceptable Use and Security policies. Basic Standard Enhanced These settings are for minimal security and would (for example) permit weak passwords to be used which can be easily guessed or cracked. This setting is the default setting for the system when it is first provisioned. We recommend that you adjust these settings to your requirements, or select the Standard or Enhanced security settings level. These settings offer increased security, which you may consider to be sufficient for your requirements. This setting includes mandatory numeric characters in passwords. The security levels of some of the settings have increased values. These settings are for enhanced security. All of the features are turned on. The security levels of appropriate items are set to an advanced security level. The system still maintains a manageable level of usability. The following tables show the default password settings. Character requirements Basic Standard Enhanced Minimum characters required in a password Character requirements Alphabetic P P P Character requirements Numeric O P P Character requirements Non- alphanumeric O O P Repeated requirements and sequences in passwords Basic Standard Enhanced Maximum length of sequences of repeated characters Maximum number of characters in alphabetic, numeric, or keyboard order Not Set Not Set 3 Other content in passwords Basic Standard Enhanced Use of words in a dictionary (including common substitutions) Allowed Not Allowed Not Allowed Use of part of the user address (including common substitutions) Not Allowed Not Allowed Not Allowed Re- use and changes Basic Standard Enhanced Number of password resets before a user can re- use the same password Maximum number of password changes in 24 hours Password expiry Basic Standard Enhanced Password expiry time 90 days 30 days 30 days Time before expiry to alert users 7 days 7 days 7 days 23

25 Spam Manager lockouts (Standard Accounts) Basic Standard Enhanced Number of incorrect password entries before lockout Lockout period 30 minutes 4 hours 1 day Spam Manager lockouts (Administrator Accounts) Basic Standard Enhanced Number of incorrect password entries before lockout Lockout period 1 hour 8 hours Permanent CONFIGURING A SPAM MANAGER PASSWORD POLICY Three preset password policies are available: Basic, Standard, and Enhanced. The settings for the currently selected policy are shown in Anti- Spam > Quarantine Settings > Password Controls > Password policy. The custom policy displays if any changes you make changes to the default settings provided by the three template policies. To configure a Spam Manager password policy: 2. Select Quarantine Settings. 3. Click Configure password policy. 4. Select the radio button for the template to be used as a starting point for your password policy: Basic, Standard, or Enhanced. The page populates with the default settings for that policy. If this is the first time of viewing this configuration screen since the service was provisioned, the Basic setting is probably already selected. 5. To change this, select Standard or Enhanced. To enable the policy settings to be editable, check the Customize selected policy checkbox. 6. Specify the minimum length for your users passwords, using the drop- down list in the Character requirements section. The character types that are required in passwords can be selected by checking the boxes - alphabetic, numeric, and non- alphanumeric characters. If a box is not checked, that type of character can still be used in passwords, but its use is not enforced. 7. Character repetition controls the number of times a particular character is repeated (for example, dddd). Specify the maximum number of repeated characters that are allowed in passwords by using the drop- down list. 8. Character sequences controls the number of alphabetic (e.g., defg), numeric (e.g., 4567), and keyboard (e.g., qwerty) characters that are allowed in sequence. Select the maximum number of characters in the sequence that can be used by using the drop- down list. These character sequences take into account several languages, which includes English, where they affect the alphabet or keyboard layout. 9. From the drop- down list, select whether any words in a standard dictionary can be used in passwords. Also select whether a user can include in their password part of the address they use when logging on to Spam Manager. Both of these conditions include substituting characters with commonly used alternatives. Examples include the use of the number 3 for the letter E, or the use of the number 1 instead of the letters I or L. 24

26 10. Set the options for reuse of the same password, and how frequently users can reset their password. You can use these options to prevent users from resetting their password repeatedly until they can use the password with which they began. 11. Password expiry settings are selected using the drop- down lists. The password expiry time is the time that elapses after a password is set up until it expires. When it expires, the user is allowed to log on using the old password, but is immediately prompted to change it. It can be helpful to prompt users in advance of their password expiring, to give them the opportunity to think of a new password. Set this advance warning time as required. 12. When a user or administrator logs on to Spam Manager, you can limit the number of attempts to key in the correct password. This is to stop password cracking systems from persisting in trying random passwords until they gain access to the system. When the user or administrator is locked out, they cannot gain access to Spam Manager until the lockout expires, even if they use the correct logon credentials. The most extreme setting for the administrator lockout is Permanent. Administrators who are locked out in this way must contact the Support team to have their account unlocked before they can log on to Spam Manager. 13. Select Save & Exit to apply the password control settings. You are returned to the Password Controls configuration screen. MAKING YOUR ACCEPTABLE USE POLICY (AUP) AVAILABLE You can make your Acceptable Use Policy (AUP) available online for your users to read by a link in Spam Manager and also in summary notifications. To make your Acceptable Use Policy available: 2. Select Quarantine Settings. 3. In the Acceptable Use Policy section, check Users can view your company Acceptable Use Policy (AUP). 4. In the field labeled Specify URL link to your AUP, enter the URL for the location of the AUP document. 5. To specify where to place the link to the AUP, check one or both of the following: Spam Manager and Notifications. 6. Click Save & Exit to apply the settings. DEFINING THE SUMMARY NOTIFICATIONS DISPLAY Spam Manager users can view the subject lines of s, preview text content, and delete s. In summary notifications, the subject line of s can be displayed. These options are particularly relevant in countries where legislation does not allow these components to be displayed if the recipient has not read the whole . In these countries these items must not be viewed without the being received in the normal way. 25

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32

IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32 IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How

More information

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide

Spam Manager User Guide. Boundary Defense for Email Anti-Spam End User Guide Spam Manager User Guide Boundary Defense for Email Anti-Spam End User Guide DOCUMENT REVISION DATE: Feb 2012 Spam Manager User Guide / Table of Contents Page 2 of 24 Table of Contents OVERVIEW... 3 1 ABOUT

More information

Spam Manager. User Guide

Spam Manager. User Guide Spam Manager User Guide Spam Manager User Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Email Data Protection. Administrator Guide

Email Data Protection. Administrator Guide Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,

More information

Email Quick Reference. Administrator Guide

Email Quick Reference. Administrator Guide Email Quick Reference Administrator Guide Email Services Quick Reference Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Cloud Services. Cloud Control Panel. Admin Guide

Cloud Services. Cloud Control Panel. Admin Guide Cloud Services Cloud Control Panel Admin Guide 10/18/2014 CONTENTS Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control... 2 Features Summary... 3 Creating an Encryption

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Document Revision Date: Sept. 11, 2012 Policy Based Encryption Gateway Admin Guide i Contents Description of Policy Based Encryption... 1 Policy Based

More information

SaskTel Hosted Exchange Administrator Guide

SaskTel Hosted Exchange Administrator Guide SaskTel Hosted Exchange Administrator Guide Customer Center Administration Portal At least the first of the following tasks (Accept the Terms of Service) needs to be completed before the company portal

More information

ModusMail Software Instructions.

ModusMail Software Instructions. ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account

More information

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide Symantec Hosted Mail Security Console and Spam Quarantine User Guide The software described in this book is furnished under a license

More information

Distributor Control Center Private Label/Channel Administrators

Distributor Control Center Private Label/Channel Administrators March 13, 2014 Distributor Control Center Private Label/Channel Administrators Version 2.6.3 Everyone.net Table of Contents Distributor Control Center... 1 1 The Distributor Control Center... 4 1.1 Introduction...

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

Using Barracuda Spam Firewall

Using Barracuda Spam Firewall Using Barracuda Spam Firewall Creating your Barracuda account Your Barracuda account has been created for you if you are a current Hartwick College student, staff or faculty member. Setting Your Password.

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Quarantine Central for end users: FAQs

Quarantine Central for end users: FAQs Quarantine Central for end users: FAQs About is a leading hosted email services company. Founded in 1994, was one of the first companies to offer hosted email security services to the North American market.

More information

Email Protection for your account

Email Protection for your account User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Barracuda Email Security Service User Guide

Barracuda Email Security Service User Guide Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Overview. Accessing the User Interface. Logging In. Resetting your Password

Overview. Accessing the User Interface. Logging In. Resetting your Password Overview The message filtering service lets a company easily provide real-time spam and virus filtering, attack blocking, and email-traffic monitoring across a user deployment of any size. Users receive

More information

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1

PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA

More information

Mimecast Services for Outlook (MSO4)

Mimecast Services for Outlook (MSO4) Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,

More information

Email Protection for your account

Email Protection for your account User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and

More information

Apps4Rent Hosted Exchange Spam Management Interface Guide.

Apps4Rent Hosted Exchange Spam Management Interface Guide. Spam Management Interface Guide. Apps4Rent Hosted Exchange Spam Management Interface Guide. NOTE: This document contains functionalities and procedures which are mainly used to manage your spam settings

More information

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Green House Data Spam Firewall Administrator Guide

Green House Data Spam Firewall Administrator Guide Green House Data Spam Firewall Administrator Guide Spam Firewall Administrator Guide... 2 Navigating the Web Interface... 2 How to Drill Down from the DOMAINS Page to Account Level... 2 Message Logs...

More information

Spam Manager. Quarantine Administrator Guide

Spam Manager. Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Table of Contents DNS Settings... 3 MX record... 3 SPF record... 3 Configuring Outbound... 3 Smart host configuration for Exchange 2003... 3 Smart host configuration for Exchange

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Email Image Control. Administrator Guide

Email Image Control. Administrator Guide Email Image Control Administrator Guide Image Control Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Forefront Online Protection for Exchange (FOPE) User documentation

Forefront Online Protection for Exchange (FOPE) User documentation Forefront Online Protection for Exchange (FOPE) User documentation About Your FOPE Quarantine Mailbox Applies To: Forefront Online Protection for Exchange This document will help you get started with the

More information

MessageLabs. Spam Manager User Guide

MessageLabs. Spam Manager User Guide MessageLabs Spam Manager User Guide Copyright and permitted use 2004, by MessageLabs Ltd. All rights reserved. This publication is the exclusive property of MessageLabs and may not be reproduced, distributed,

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4

GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4 GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

WatchGuard QMS End User Guide

WatchGuard QMS End User Guide WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Preface... 4. Introduction to Proofpoint Essentials... 5

Preface... 4. Introduction to Proofpoint Essentials... 5 July 2014 Preface... 4 About this Guide... 4 Intended Audience and Prerequisite Knowledge... 4 Other Sources of Information... 4 Contacting Proofpoint Essentials Support... 4 Knowledge Base... 5 Support

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Comodo Antispam Gateway Software Version 2.4

Comodo Antispam Gateway Software Version 2.4 Comodo Antispam Gateway Software Version 2.4 User Guide Guide Version 2.4.070715 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...

More information

Avira Exchange Security Small Business Edition. Quick Guide

Avira Exchange Security Small Business Edition. Quick Guide Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

MX Control Console & Spam Quarantine Report User Guide

MX Control Console & Spam Quarantine Report User Guide MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Personal Dashboard User Guide

Personal Dashboard User Guide Version 8.1 800-782-3762 www.edgewave.com 2001 2011 EdgeWave. All rights reserved. The Red Condor and EdgeWave logos and brands are trademarks of EdgeWave. All other trademarks and registered trademarks

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your

Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages

More information

PureMessage for Microsoft Exchange Help. Product version: 4.0

PureMessage for Microsoft Exchange Help. Product version: 4.0 PureMessage for Microsoft Exchange Help Product version: 4.0 Document date: July 2013 Contents 1 About PureMessage for Microsoft Exchange...3 2 Key concepts...4 3 Administration console...7 4 Monitoring...9

More information

Mailbox control panel. User guide

Mailbox control panel. User guide Mailbox control panel User guide Close this window Mailbox control panel user guide Mailbox control panels enable you to configure your settings for a specific mailbox with ease, with features ranging

More information

eprism Email Security Suite

eprism Email Security Suite V8.4 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Using the University s Spam and Virus E-mail Filtering Service

Using the University s Spam and Virus E-mail Filtering Service Using the University s Spam and Virus E-mail Filtering Service Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Overview The University of Pittsburgh s spam and virus e-mail filtering

More information

Deploying Layered Email Security. What is Layered Email Security?

Deploying Layered Email Security. What is Layered Email Security? Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review

More information

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide

FuseMail- Exchange ControlPanel Admin Guide Feb.27-14 V1.0. Exchange ControlPanel Administration Guide Exchange ControlPanel Administration Guide Table of Contents Top Level Portal Administration... 4 Signing In to Control Panel... 4 Restoring Account Password... 5 Change Account Details... 7 Viewing Account

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2005, Barracuda Networks www.barracudanetworks.com v3.2.22 All rights reserved. Use of this product and this manual is subject to license. Information

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

SECURE MESSAGING PLATFORM

SECURE MESSAGING PLATFORM SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9

More information

Quick Start Policy Patrol Mail Security 10

Quick Start Policy Patrol Mail Security 10 Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

EFFECTIVE SPAM FILTERING WITH MDAEMON

EFFECTIVE SPAM FILTERING WITH MDAEMON EFFECTIVE SPAM FILTERING WITH MDAEMON Introduction The following guide provides a recommended method for increasing the overall effectiveness of MDaemon s spam filter to reduce the level of spam received

More information

Hosting Control Panel (CP) Admin Guide

Hosting Control Panel (CP) Admin Guide Hosting Control Panel (CP) Admin Guide Document Revision Date: May 16, 2013 Hosting CP Admin Guide / TOC Page i Contents HOW TO USE THIS HOSTING CP ADMIN GUIDE... 1 GET STARTED WITH EXCHANGE... 1 Other

More information

Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam

Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam Admin Quick Start Guide Email Protection Service Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: January, 2010 Email Protection Admin Quick Start Guide / Table of Contents Page 2 of 17 Table of Contents

More information

Barracuda Spam Firewall User s Guide

Barracuda Spam Firewall User s Guide Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Outlook 2010 Essentials

Outlook 2010 Essentials Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...

More information

emarketing Manual- Creating a New Email

emarketing Manual- Creating a New Email emarketing Manual- Creating a New Email Create a new email: You can create a new email by clicking the button labeled Create New Email located at the top of the main page. Once you click this button, a

More information

Barracuda Spam & Virus Firewall User's Guide 5.x

Barracuda Spam & Virus Firewall User's Guide 5.x Barracuda Spam & Virus Firewall Barracuda Spam & Virus Firewall User's Guide 5.x This guide describes how you can check your quarantined messages, classify messages as spam and not spam, manage whitelisting

More information

Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C

Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C Junk Email Filtering System User Manual Copyright Corvigo, Inc. 2002-03. All Rights Reserved 509-8282-00 Rev. C The Corvigo MailGate User Manual This user manual will assist you in initial configuration

More information

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ)

Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) Tufts Technology Services (TTS) Proofpoint Frequently Asked Questions (FAQ) What is Proofpoint?... 2 What is an End User Digest?... 2 In my End User Digest I see an email that is not spam. What are my

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109 K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete

More information

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php

Deployment Guide. For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php Deployment Guide For the latest version of this document please go to: http://www.exchangedefender.com/documentation.php ExchangeDefender Introduction The purpose of this guide is to familiarize you with

More information

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header. Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments

More information

Secure Messaging Service

Secure Messaging Service Secure Messaging Service Powered by Trend Micro Email Security Platform for Service Providers Service Provider s Guide Trend Micro Incorporated reserves the right to make changes to this document and

More information

MyFaxCentral User Administration Guide

MyFaxCentral User Administration Guide faxing simplified. anytime. anywhere. MyFaxCentral User Administration Guide www.myfax.com MyFaxCentral Common Controls...1 Navigation Controls...1 Customize View...1 MyFaxCentral User Administration...2

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Creating a Content Group and assigning the Encrypt action to the Group.

Creating a Content Group and assigning the Encrypt action to the Group. Product Guide Revision A SaaS Email Encryption Enablement for Customers, Domains, and Users Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

Configuring Facebook for a More Secure Social Networking Experience

Configuring Facebook for a More Secure Social Networking Experience CPF 00009-15-CID361-9H-Facebook* 10 November 2015 Configuring Facebook for a More Secure Social Networking Experience Settings Settings are available under the Facebook Configuration Arrow. General Settings

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

Configuring MDaemon for Centralized Spam Blocking and Filtering

Configuring MDaemon for Centralized Spam Blocking and Filtering Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized

More information